Cyber Domain Case Study

Great Essays
Introduction

The cyber domain is perhaps the most complex domain to define in modern warfare. Academic literature has secured cyber as both a domain and part of the global common. National laws, policies, and understanding of the cyber domain are just being to mature; thus, the strategy to guide and form the required organizations to support cyber is just being to develop. This paper will consider whether the current national cyber construct is sufficient to address the cyber domains unique geography. Next the paper will examine whether the national organizational structure tasked with cyber operations needs to be reorganized and subsequently require a change to the United States Code (USC). Finally, the paper will discuss that if a reorganization is required, which agency should be in charge of cyber security for the United States. Cyber Geography
The emergence of the cyber domain has been uniquely different than the traditional domains of air, land, and maritime. Theories about both the cyber and space domains have at times been very similar, treating the domains and purely functional rather than having a physical geography. Colin Gray writing about the future of war related to these two domains states:
It has been rare in history for a new geography to be added to the elite short list of environments for warfare.
…show more content…
The permeation and diffusion of cyber responsibilities across different government agencies is to be expected based on the technological development of cyber. Cyber technology exponentially spread through every aspect and sector of society and government agencies were forced to integrate and assume cyber responsibilities just by the nature of the domain. This has resulted in several government agencies responsible to multiple title authorities having cyber under their

Related Documents

  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Ef 21 Research Papers

    • 965 Words
    • 4 Pages

    Fires 5. Command and Control / NET Centric 6. Cyberspace and the Electromagnetic Spectrum 7. Force Protection 8. Intelligence 9.…

    • 965 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Joint Force 2020

    • 1383 Words
    • 6 Pages

    The Chairman of Joint Chiefs of Staff, General Martin Dempsey, summed up his assessment of the 2014 Quadrennial Defense Review (QDR) in the following statement: “With our “ends” fixed and our “means” declining, it is therefore imperative that we innovate within the “ways” we defend the Nation.” Strategic planning and transition to Joint Force 2020 (JF 2020) in a fiscally constrained environment affords DoD senior leaders the opportunity to be more innovative than ever before in assessing and mitigating risks to effectively confront a multitude of increasingly multifaceted security challenges. In the long run, a leaner, agile, adaptable, interoperable, and technologically sophisticated JF 2020 is necessary for the Combatant Commanders to…

    • 1383 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Expeditionary Force 21 (EF21) “provides guidance for how the Marine Corps Total Force – as an integral part of the lager naval and joint team – will be postured, organized, trained, and equipped to fulfill assigned public law and national policy responsibilities.” (Expeditionary Force 21 Capstone Concept p. 5). Expeditionary Force 21 is essentially the Marine Corps 10 year vision and action plan. According Week 1’s video presentation, EF21 seeks to: establish a forward presence of one-third of U.S. Marine Corps operational forces; establish regionally oriented units connected and integrated with theater staff; maintain modular forces capable of being tailored respective to the mission and requirement; possess a standing headquarters capable…

    • 912 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Black Ice Summary

    • 823 Words
    • 4 Pages

    The Nation's critical infrastructure is diverse and complex. It includes distributed networks, varied organizational structures and operating models (including multinational ownership), interdependent functions and systems in both the physical space and cyberspace, and governance constructs that involve multi-level authorities, responsibilities, and regulations. Critical infrastructure owners and operators are uniquely positioned to manage risks to their individual operations and assets, and to determine effective strategies to make them more secure and resilient. All Federal department and agency heads are responsible for the identification, prioritization, assessment, remediation, and security of their respective internal critical infrastructure…

    • 823 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Dni Effect

    • 1657 Words
    • 7 Pages

    As the number of arrests shows, domestic terrorism is not going away and as the enemy evolves and transforms into a more sophisticated terrorist, the law enforcement and intelligence communities at all levels must do so as well. Experts in the domestic terrorism field warn against the intersections where the cyber-terror, narco-traffickers and terrorist will meet. Currently, the intelligence agencies that monitor these different types of threats are disconnected and the IC is not positioned to detect an intersection among these disparate groups. This is clearly a vulnerability that exists within the framework of the domestic counter-terrorism IC; joint collaboration must continue to evolve to ensure an attack does not occur in these…

    • 1657 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    DHS Missions

    • 648 Words
    • 3 Pages

    The office secures non military personnel and government PC frameworks, secure data frameworks for basic foundation, and dissect and lessen digital dangers. Encouraging reaction to digital episodes is basic to ensure our frameworks are protected. There are frameworks we use to encourage our destinations. The National Cybersecurity Protection System (NCPS), Continuous Diagnostics and Mitigation (CDM), National Cybersecurity and Communications Reconciliation Center (NCCIC), and the Federal Information Security Management Act (FISMA) Reporting guarantees that we ensure our the internet (Securing and Managing Our Borders…

    • 648 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Essay On Homeland Security

    • 1030 Words
    • 5 Pages

    After the 2001 attacks The Department of Homeland Security had to completely remodel its system and focus on terrorism as the main threat. “Terrorists today can strike at any place, at any time, and with virtually any weapon. This is a permanent condition and these new threats require our country to design a new homeland security structure.” Our country suffered from this event and it has been the focus of Homeland Security to make sure nothing like that ever happens again. The USSS has taken effective measures in expanding its investigation in computer networks and monitoring internet activity.…

    • 1030 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    International and domestic law are not perfect instruments to fight against cyberattacks, chemical, biological, radiological and nuclear (CBRN) agents and weapons, terrorism finance, or terrorism in general, the private sector and civilian population has to be involved. This is because the nature of these unconventional attacks, coupled with the impossibilities of “perfect security” only allows for a balancing of risk that can be achieved through a redundancy approach to managing these threats. The balancing of risk is optimal when the domestic and international law, the private sector, and the civilian population are working in tandem. The first section of this paper will define a realistic goal of security. The second section will explain the uniqueness of the threats mentioned above.…

    • 1425 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    One of the first attacks of cyber terrorism was in the early 1980s during the phase of the cold war, where CIA implemented a backdoor virus which is commonly referred as “Logic Bomb” in the Siberian pipelines.…

    • 1484 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    “ By the 20th century, military organizations confronted the problem of not only adapting to technological changes in peace time, but also the fact that war itself has inevitably turned up the speed of technological change”. The first Gulf War constitutes a turning point in the history of modern conflicts essentially because of the integration of technology into all levels of military operations. War was always been a declaration of hostility between two opposing groups clashed over a battlefield in a duel with the ultimate aim to impose its will on the other. However, the advent of new technologies has completely changed these legendary and almost static clashes.…

    • 1300 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Superior Essays

    Cyberwarfare Since the 1900’s with the start of the Internet, the world has become more and more dependent on it. The word cyberwarfare is very well known across the world in the current days because everyone lives in a technologically interconnected world. It is defined as actions by a nation-state to penetrate another nation 's computer or networks for the purposes of causing damage or disruption; also we can include non-state actors such as terrorist groups, companies, etc.…

    • 1220 Words
    • 5 Pages
    Superior Essays